A Survey on Cloud Computing with different Encryption Techniques to Secure Cloud Data
Keywords:
Component Cloud computing security, Obstacles in cloud, Attribute based encryption, Homomorphic encryptionAbstract
Cloud provides facility of assigning data to a great number of scattered computers, rather than local computer or remote server. This paper briefly surveys the issues in cloud computing security. The fact is that the data shared with the cloud service provider is identified as the core scientific problem that separates cloud computing security from other topics in
computing environment. The paper also describes different encryption techniques to secure the cloud data from unauthorized
users.
References
Huth and J. Cebula, “The Basics of Cloud Computing,” Carnegie Mellon University. pp. 1–4, 2011 [Online].
S. Marston, Z. Li, S. Bandyopadhyay, J.Zhang, and A. Ghalsasi, “Cloud computing the business perspective,” Decis. Support Syst.,vol. 51, no. 1, pp. 176–189, Apr. 2011.
P. Mell, T. Grance, and T. Grance, “The NIST
Definition of Cloud Computing” Recommendations of the National Institute Of Standards and Technology, pp. 800-145, September 2011.
P. G. Dorey and a. Leite, “Commentary: Cloud computing – A security problem or solution?”Inf. Secur. Tech. Rep., vol. 16,no. 3–4, pp. 89–96, Aug. 2011.
M. Armbrust, A. D. Joseph, R. H. Katz, and D. A. Patterson, “Above the Clouds: A Berkeley View of Cloud Computing,” University of California at Berkeley pp. 14- 19, February 10, 2009.
B. J. Brodkin, N. W. Cloud, S. Risks, C. Computing, and G.
A. Engine, “Gartner: Seven cloud-computing security risks,” pp. 2–3, 2008.
C. Lee, P. Chung, and M. Hwang, “A Survey on Attribute- based Encryption Schemes of Access Control in Cloud Environments,” vol. 15, no. 4, pp. 231–240, 2013.
N. York, “Securing the cloud with homomorphic encryption,” vol. 20, no. 3, pp. 1–4, 2014.
M. Tibouchi, “Fully Homomorphic Encryption over the Integers: From Theory to Practice,” pp. 1–4, 2014.
A. Atayero and O. Feyisetan, “Security Issues in Cloud Computing : The Potentials of Homomorphic Encryption,” vol. 2, no. 10, pp. 546–552, 2011.
M. Tebaa, S. E. L. Hajji, and A. E. L. Ghazi,“Homomorphic Encryption Applied to the Cloud Computing Security,” vol. 1, pp. 8–11, 2012.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
